Siirry sisältöön
Hacker’s Corner

Hacker’s Corner

Tuesday 29.10. 10:30–13:00

Immerse yourself in the excitement of our Red Teaming Capture The Flag (CTF) competition. This is your chance to test your skills, collaborate with peers, and tackle real-world security scenarios.

Focus on Red Teaming CTF:
Test your skills, engage with top professionals, and tackle real-world challenges in our Red Teaming Capture The Flag (CTF) competition.

How to Participate:
Register for Cyber Security Nordic to secure your spot in the CTF. Don’t miss out—register now!

Tuesday 29.10. 14:45–15:15

Wednesday 30.10. 10:45–11:15 & 11:30–12:00

Don’t miss this eye-opening demonstration on how viruses can target and infect a Mac! Join us to learn valuable insights from real-world hacking techniques and how to protect your system. – WithSecure

Speakers:

Hannu Uchida
Ville Korhonen

Tuesday 29.10. 13:00–14:15
Wednesday 30.10. 14:30–15:15

Security breach in the defender’s point of view.

Demo in brief

1. Attack demonstration from the attacker’s view
• Initial breaching techniques
• Security breach demonstrating for example data leak

2. Simultaneous defender point of view
• How breach is seen in defender’s systems
• Possible defending actions

3. Wrap up – Lessons learned
• Why monitoring & response capability is important

Target audience: Semi-technical

Tuesday 29.10. 15:15–16:30

In our hyper-connected world, a single breach can disrupt industries and cripple critical infrastructure. Superficial security testing is no longer enough.

Focus: The demo urges cyber security professionals to adopt a holistic, root-cause-driven approach to application security. Through the story of “Lucy,” we highlight the importance of addressing deeper issues for true security.

Techniques: Using examples like SQL injection, we’ll challenge the status quo and advocate for comprehensive application security. It’s time for cyber professionals to rise as both assessors and educators, demanding more from our systems and enforcing stricter standards to prevent catastrophic breaches like Vastaamo, where inadequate security led to devastating consequences.

Target audience: People responsible for securing information systems, such as product owners, developers, system architects, security professionals, and IT managers.

Wednesday 30.10. 12:00–13:00

In this demo you will see how Vectra AI works in close to real life scenario when attackers is using network, identity and O365 as an attack surface. Session is for security engineers, SOC analyst or anyone who like to see how Vectra AI really works

Wednesday 30.10. 13:00–14:15

Imagine if you could watch every step they taken… Unmasking a threat actor activity is sometime like deciphering an ancient manuscript, but what if you can see every move and control when to strike the pause.

This session is not about log analysis, or following the breadcrumbs left by an elusive adversary. It is about having a full timeline of the threat actors machine and knowing exactly what was done without assumptions or guessing!